Elements of information theory
Elements of information theory
Communications of the ACM - Ontology: different ways of representing the same concept
An Antiphishing Strategy Based on Visual Similarity Assessment
IEEE Internet Computing
A potential IRI based phishing strategy
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
Fighting unicode-obfuscated spam
Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit
Hi-index | 0.00 |
A severe potential security problem in utilization of Unicode on the Web is identified, which is resulted from the fact that there are many similar characters in the Universal Character Set (UCS). The foundation of our solution relies on evaluating the similarity of characters in UCS. We develop a solution based on the renowned Kernel Density Estimation (KDE) method to establish such a Unicode Similarity List (UC-SimList).